Impact
The flaw lies within an unknown UART interface function in the Beetel 777VR1 firmware up to 01.00.09/01.00.09_55, producing improper access controls. An attacker who can physically reach the device could manipulate the UART interface, bypassing the intended protection and allowing unauthorized configuration changes, data extraction, or other disruptive actions. The description indicates that the attack requires physical proximity; the likely attack vector is therefore inferred to be on‑site manipulation of the UART port rather than remote exploitation.
Affected Systems
The affected hardware is the Beetel 777VR1 microcontroller‑based device. Firmware versions up to 01.00.09/01.00.09_55 are susceptible; no other products or firmware revisions are listed in the CNA data.
Risk and Exploitability
The CVSS score of 5.4 denotes moderate severity, and the EPSS value of less than 1 % suggests exploitation is presently unlikely. The vulnerability is not catalogued in the CISA KEV list. Because the exploit requires physical access and a relatively high level of complexity, the threat is constrained to environments where an attacker can reach the UART port and has the technical skill to craft the manipulation. With no vendor patch currently available, the best defenses center on restricting physical access, disabling the interface when not required, and monitoring for anomalous UART activity.
OpenCVE Enrichment